Computational complexity of network vulnerability analysis

Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute. Currently, the fastest known algorithms run in polynomial time. Motivated by the fast-grow...

Full description

Bibliographic Details
Main Author: Berberler Murat Erşen
Format: Article
Language:English
Published: Sciendo 2022-12-01
Series:Acta Universitatis Sapientiae: Informatica
Subjects:
Online Access:https://doi.org/10.2478/ausi-2022-0012
_version_ 1811159173947195392
author Berberler Murat Erşen
author_facet Berberler Murat Erşen
author_sort Berberler Murat Erşen
collection DOAJ
description Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute. Currently, the fastest known algorithms run in polynomial time. Motivated by the fast-growing need to compute vulnerability measures on complex networks, new algorithms for computing node and edge residual closeness are introduced in this paper. Those proposed algorithms reduce the running times to Θ(n3) and Θ (n4) on unweighted networks, respectively, where n is the number of nodes.
first_indexed 2024-04-10T05:37:45Z
format Article
id doaj.art-58e4cec3b475437ea396b7749b5aacb1
institution Directory Open Access Journal
issn 2066-7760
language English
last_indexed 2024-04-10T05:37:45Z
publishDate 2022-12-01
publisher Sciendo
record_format Article
series Acta Universitatis Sapientiae: Informatica
spelling doaj.art-58e4cec3b475437ea396b7749b5aacb12023-03-06T17:00:03ZengSciendoActa Universitatis Sapientiae: Informatica2066-77602022-12-0114219920710.2478/ausi-2022-0012Computational complexity of network vulnerability analysisBerberler Murat Erşen0Faculty of Science, Department of Computer Science, Dokuz Eylül University, 35160, Izmir, TürkiyeResidual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute. Currently, the fastest known algorithms run in polynomial time. Motivated by the fast-growing need to compute vulnerability measures on complex networks, new algorithms for computing node and edge residual closeness are introduced in this paper. Those proposed algorithms reduce the running times to Θ(n3) and Θ (n4) on unweighted networks, respectively, where n is the number of nodes.https://doi.org/10.2478/ausi-2022-0012vulnerabilitycomplex networksdesign of algorithmsgraph algorithms05c4068m1068r10
spellingShingle Berberler Murat Erşen
Computational complexity of network vulnerability analysis
Acta Universitatis Sapientiae: Informatica
vulnerability
complex networks
design of algorithms
graph algorithms
05c40
68m10
68r10
title Computational complexity of network vulnerability analysis
title_full Computational complexity of network vulnerability analysis
title_fullStr Computational complexity of network vulnerability analysis
title_full_unstemmed Computational complexity of network vulnerability analysis
title_short Computational complexity of network vulnerability analysis
title_sort computational complexity of network vulnerability analysis
topic vulnerability
complex networks
design of algorithms
graph algorithms
05c40
68m10
68r10
url https://doi.org/10.2478/ausi-2022-0012
work_keys_str_mv AT berberlermuratersen computationalcomplexityofnetworkvulnerabilityanalysis